In terms of Chinese sentiment analysis or polarity detection, despite numerous proposed methods, they often exhibit significant language or knowledge dependencies, limiting their generality and scalability in real eng...
详细信息
ISBN:
(纸本)9789819743865;9789819743872
In terms of Chinese sentiment analysis or polarity detection, despite numerous proposed methods, they often exhibit significant language or knowledge dependencies, limiting their generality and scalability in real engineering projects. To address this issue, this paper introduces a Three Layer Chinese Sentiment Polarity Detection Framework (TLCSPDF). This framework decouples the final polarity detection from language processing by dividing the task into three interactive layers. This modular approach allows for the incorporation of various modules at different layers, facilitating reusability and configuration to meet specific project requirements. Additionally, this paper presents a specialized TLCSPDF designed for polarity detection in Chinese product comments, along with an in-depth exploration of its inner modules.
In order to improve the precision and efficiency of precision equipment assembly, a high-precision industrial measurement system is construction by using total station and Spatial Analyzer software. Based on the basic...
详细信息
Modern microservice systems have become increasingly complicated due to the dynamic and complex interactions and runtime environment. It leads to the system vulnerable to performance issues caused by a variety of reas...
详细信息
Using Semantic Web technologies is critical to improving knowledge sharing and administrative efficiency and fostering semantic interoperability amongst healthcare information systems. This article offers a thorough e...
详细信息
The deployment of distributed multi-controllers for software-Defined Networking(SDN)architecture is an emerging solution to improve network scalability and ***,the network control failure affects the dynamic resource ...
详细信息
The deployment of distributed multi-controllers for software-Defined Networking(SDN)architecture is an emerging solution to improve network scalability and ***,the network control failure affects the dynamic resource allocation in distributed networks resulting in network disruption and low ***,we consider the control plane fault tolerance for cost-effective and accurate controller location models during control plane *** fault-tolerance strategy has been applied to distributed SDN control architecture,which allows each switch to migrate to next controller to enhance network *** this paper,the Reliable and Dynamic Mapping-based Controller Placement(RDMCP)problem in distributed architecture is framed as an optimization problem to improve the system reliability,quality,and *** considering the bound constraints,a heuristic state-of-the-art Controller Placement Problem(CPP)algorithm is used to address the optimal assignment and reassignment of switches to nearby controllers other than their regular *** algorithm identifies the optimal controller location,minimum number of controllers,and the expected assignment costs after failure at the lowest effective cost.A metaheuristic Particle Swarm Optimization(PSO)algorithm was combined with RDMCP to form a hybrid approach that improves objective function optimization in terms of reliability and *** effectiveness of our hybrid RDMCP-PSO was then evaluated using extensive experiments and compared with other baseline *** findings demonstrate that the proposed hybrid technique significantly increases the network performance regarding the controller number and load balancing of the standalone heuristic CPP algorithm.
Trust is integral for the successful and secure functioning of software supply chains, making it important to measure the state and evolution of trust in open source communities. However, existing security and supply ...
详细信息
ISBN:
(纸本)9798400705007
Trust is integral for the successful and secure functioning of software supply chains, making it important to measure the state and evolution of trust in open source communities. However, existing security and supply chain research often studies the concept of trust without a clear definition and relies on obvious and easily available signals like GitHub stars without deeper grounding. In this paper, we explore how to measure trust in open source supply chains with the goal of developing robust measures for trust based on the behaviors of developers in the community. To this end, we contribute a process for decomposing trust in a complex large-scale system into key trust relationships, systematically identifying behavior-based indicators for the components of trust for a given relationship, and in turn operationalizing data-driven metrics for those indicators, allowing for the wide-scale measurement of trust in practice.
Detection of novel game cheating tools is critical for ensuring fair online play. Such cheating tools are visual-based and effectively avoid detection because they do not change the data of game software. With the dev...
详细信息
This paper suggests a suitable feature selection (FS) approach FSFPA using flower pollination algorithm (FPA). It is based on the concept of flower pollination, to choose a set of important features or variables from ...
详细信息
Social media provide a steady diet of dire warnings that artificial intelligence (AI) will make softwareengineering (SE) irrelevant or obsolete. To the contrary, the engineering discipline of software is rich and rob...
详细信息
ISBN:
(纸本)9798400712159
Social media provide a steady diet of dire warnings that artificial intelligence (AI) will make softwareengineering (SE) irrelevant or obsolete. To the contrary, the engineering discipline of software is rich and robust;it encompasses the full scope of software design, development, deployment, and practical use;and it has regularly assimilated radical new offerings from AI. Current AI innovations such as machine learning, large language models (LLMs) and generative AI will offer new opportunities to extend the models and methods of SE. They may automate some routine development processes, and they will bring new kinds of components and architectures. If we're fortunate they may force SE to rethink what we mean by correctness and reliability. They will not, however, render SE irrelevant.
Vulnerability scanning is a process that involves using software tools to identify security weaknesses in computer systems, networks, or applications. There are various architectures that can be used for vulnerability...
详细信息
暂无评论